Archive for the ‘security’ category: Page 4

Feb 19, 2022

Robot dogs could patrol the US-Mexico border

Posted by in categories: robotics/AI, security

The photos look like a scene out of science fiction: Robot dogs patrolling the US-Mexico border, climbing over harsh terrain to search for threats and contraband.

But these images are real.

Continue reading “Robot dogs could patrol the US-Mexico border” »

Feb 18, 2022

JPMorgan unveils research on quantum resistant blockchain network

Posted by in categories: blockchains, computing, quantum physics, security

Marco Pistoia, engineer, and head of the FLARE Research group at JPMorgan Chase emphasized the importance of building secure blockchains before quantum computing changes the “security landscape” of blockchain and crypto.

Feb 12, 2022

Vitalik Buterin on Ethereum and immortality

Posted by in categories: biological, blockchains, cryptocurrencies, life extension, security

In this episode of UpOnly, the creator of Ethereum Vitalik Buterin talks origin stories, his motivation, the future of Ethereum, and even biological sciences.

Presented by FTX: https://uponyl.tv/ftx.

Continue reading “Vitalik Buterin on Ethereum and immortality” »

Feb 6, 2022

Your Cousin From Boston (Dynamics) :60

Posted by in categories: robotics/AI, security

**PARTY EDITION** Real robots. NO visual effects!

While working security at the Boston Dynamics robotics lab, Your Cousin From Boston gives a robot a Sam Adams. At least he brought a Wicked IPA Party Pack to share!

Feb 1, 2022

Over 20,000 data center management systems exposed to hackers

Posted by in categories: business, computing, security

Researchers have found over 20,000 instances of publicly exposed data center infrastructure management (DCIM) software that monitor devices, HVAC control systems, and power distribution units, which could be used for a range of catastrophic attacks.

Data centers house costly systems that support business storage solutions, operational systems, website hosting, data processing, and more.

The buildings that host data centers must comply with strict safety regulations concerning fire protection, airflow, electric power, and physical security.

Continue reading “Over 20,000 data center management systems exposed to hackers” »

Jan 29, 2022

Multiple clients for Sunflower Lab’s security drone-dock system

Posted by in categories: drones, robotics/AI, security

Sunflower Labs announces a flurry of client acquisitions of its security drone-in-dock Beehive System in both the US and Europe.

San Carlos-based Sunflower Labs has announced a spate of new clients for its automated Beehive System security drone-and-dock, in deals ranging from Switzerland to the US South.

Continue reading “Multiple clients for Sunflower Lab’s security drone-dock system” »

Jan 28, 2022

Silkworm security? Researchers create new authentication method using silk fibers

Posted by in categories: materials, security

Academics say the material could be used to create unclonable physical components suitable for supporting digital security.

Jan 27, 2022

Meta Is Making a Monster AI Supercomputer for the Metaverse

Posted by in categories: encryption, information science, internet, robotics/AI, security, supercomputing

Though Meta didn’t give numbers on RSC’s current top speed, in terms of raw processing power it appears comparable to the Perlmutter supercomputer, ranked fifth fastest in the world. At the moment, RSC runs on 6,800 NVIDIA A100 graphics processing units (GPUs), a specialized chip once limited to gaming but now used more widely, especially in AI. Already, the machine is processing computer vision workflows 20 times faster and large language models (like, GPT-3) 3 times faster. The more quickly a company can train models, the more it can complete and further improve in any given year.

In addition to pure speed, RSC will give Meta the ability to train algorithms on its massive hoard of user data. In a blog post, the company said that they previously trained AI on public, open-source datasets, but RSC will use real-world, user-generated data from Meta’s production servers. This detail may make more than a few people blanch, given the numerous privacy and security controversies Meta has faced in recent years. In the post, the company took pains to note the data will be carefully anonymized and encrypted end-to-end. And, they said, RSC won’t have any direct connection to the larger internet.

To accommodate Meta’s enormous training data sets and further increase training speed, the installation will grow to include 16,000 GPUs and an exabyte of storage—equivalent to 36,000 years of high-quality video—later this year. Once complete, Meta says RSC will serve training data at 16 terabytes per second and operate at a top speed of 5 exaflops.

Continue reading “Meta Is Making a Monster AI Supercomputer for the Metaverse” »

Jan 25, 2022

Twin-field quantum key distribution (QKD) across an 830-km fibre

Posted by in categories: computing, encryption, internet, quantum physics, security

By using quantum key distribution (QKD), quantum cryptographers can share information via theoretic secure keys between remote peers through physics-based protocols. The laws of quantum physics dictate that photons carrying signals cannot be amplified or relayed through classical optical methods to maintain quantum security. The resulting transmission loss of the channel can limit its achievable distance to form a huge barrier to build large-scale quantum secure networks. In a new report now published in Nature Photonics, Shuang Wang and a research team in quantum information, cryptology and quantum physics in China developed an experimental QKD system to tolerate a channel loss beyond 140 dB across a secure distance of 833.8 km to set a new record for fiber-based quantum key distribution. Using the optimized four-phase twin-field protocol and high quality setup, they achieved secure key rates that were more than two orders of magnitude greater than previous records across similar distances. The results form a breakthrough to build reliable and terrestrial quantum networks across a scale of 1,000 km.

Quantum cryptography and twin-field quantum key distribution (QKD)

Quantum key distribution is based on fundamental laws of physics to distribute secret bits for information-theoretic secure communication, regardless of the unlimited computational power of a potential eavesdropper. The process has attracted widespread attention in the past three decades relative to the development of a global quantum internet, and matured to real-world deployment through optical-fiber networks. Despite this, wider applications of QKD are limited due to channel loss, limiting increase in the key rate and range of QKD. For example, photons are carriers of quantum keys in a QKD setup, and they can be prepared at the single-photon level to be scattered and absorbed by the transmission channel. The photons, however, cannot be amplified, and therefore the receiver can only detect them with very low probability. When transmitted via a direct fiber-based link from the transmitter to the receiver, the key rate can therefore decrease with transmission distance.

Jan 21, 2022

Meat-based vs Plant-based Diet for Longevity | David Sinclair and Lex Fridman

Posted by in categories: genetics, life extension, security

Lex Fridman Podcast full episode: https://www.youtube.com/watch?v=jhKZIq3SlYE
Please support this podcast by checking out our sponsors:
- Onnit: https://lexfridman.com/onnit to get up to 10% off.
- Clear: https://clearme.com/lexpod and use code LexPod to get 2 months free.
- National Instruments (NI): https://www.ni.com/perspectives.
- SimpliSafe: https://simplisafe.com/lex and use code LEX to get a free security camera.
- Linode: https://linode.com/lex to get $100 free credit.

David Sinclair is a geneticist at Harvard and author of Lifespan.

Continue reading “Meat-based vs Plant-based Diet for Longevity | David Sinclair and Lex Fridman” »

Page 4 of 9112345678Last